Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 06:45
Static task
static1
Behavioral task
behavioral1
Sample
dfaec585afad63fdba186af6a56d4300_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dfaec585afad63fdba186af6a56d4300_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfaec585afad63fdba186af6a56d4300_JaffaCakes118.html
-
Size
139KB
-
MD5
dfaec585afad63fdba186af6a56d4300
-
SHA1
dd5509233bce8ecaea54db023f23c0dce44bd408
-
SHA256
988d81b3893a794a27d34058d80d7e92e98031dd92b5ec379caca57dc4fb9d93
-
SHA512
623732eaa5c2c266e9845c4c79f96df4faedf87005f429dce5aef08821ec08a63284a508c3016c4016d65d9f4c769dac697342166df8eed888afaec7fdd96d79
-
SSDEEP
1536:SRhA9M5RlWU9yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SRBQU9yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 1116 4684 msedge.exe 83 PID 4684 wrote to memory of 1116 4684 msedge.exe 83 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2400 4684 msedge.exe 84 PID 4684 wrote to memory of 2564 4684 msedge.exe 85 PID 4684 wrote to memory of 2564 4684 msedge.exe 85 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86 PID 4684 wrote to memory of 5080 4684 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dfaec585afad63fdba186af6a56d4300_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfe1346f8,0x7ffcfe134708,0x7ffcfe1347182⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,17036159733476969298,12796364092300842082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,17036159733476969298,12796364092300842082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,17036159733476969298,12796364092300842082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17036159733476969298,12796364092300842082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17036159733476969298,12796364092300842082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,17036159733476969298,12796364092300842082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5ecd5f35669be0c36a55d8cadeee4f922
SHA1df5da87482b8c5ac17eb3cd4329796e43fae7aaa
SHA256aebee2dc92f865840e0186bbaf28d5376444b5edc02b67c95627e2fa41ae2589
SHA51253f128aa1f1c732e4b0316e84d8fc061a45aba386bb996cae9cc0c087d120c908b6edec229d5912004aab7777aa4d4c72f95a06d41c17f5174c66abdbc1e22ea
-
Filesize
6KB
MD5978ad84ea3cbc3532eb5574b46ebdc7e
SHA1bed33e6ed74e84fde7b38e3ec81268504e0ffa0c
SHA256dcf6e06a24147e78b61171827ea0d23c92b9a0982747e10f5e377c5c1e3fdada
SHA512ade7155ba5f21461c96cffe6cc043a2528bfce08e78e4ca12415f702ff34da6deeeeddaeb00d53e03b30969b86863dcdc5913858ffb17c2a5dee683bc05a0202
-
Filesize
10KB
MD55bdf17f83ba1704e81c1a8881ba5ba46
SHA142c9377575c77f137b38fb65796e2c9174b7a0ac
SHA256f026076386d4efbf3a9134e3e54c82661d8a85bb2805c0e344887d8e6cd6b7d3
SHA5128ab113951be17c7461bfc66682bc77c0e774f1da786b42034a8432015cb72609fc38f168304396351f32be2cbc0238540f7d322ae9c3686bc2aa7c7f4a867426